C:\Documents and Settings\abie\Desktop\key3stealWithRC4\Stub\Stub\obj\Release\Stub.pdb
Static task
static1
Behavioral task
behavioral1
Sample
ace7779f53e4b3fe7e5addfaaf8cfa34_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ace7779f53e4b3fe7e5addfaaf8cfa34_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ace7779f53e4b3fe7e5addfaaf8cfa34_JaffaCakes118
-
Size
435KB
-
MD5
ace7779f53e4b3fe7e5addfaaf8cfa34
-
SHA1
485690a779fa81e253523671bcf965c938835e0c
-
SHA256
d2a4ef6437d6e03795fa6fb06303ae0f26b7cfd7744f94660c716f0f295a67c6
-
SHA512
628a5b4abe86323b5f6177f8bd63bb5dd95723e3e40131c90159b70403725f3254d2a05cbb4b16eec341628ca963d0db72f333f9d2b7980700efca4b30e1c340
-
SSDEEP
6144:zncyO25e0bEZ5qfn86SIh/LvPTnNfyAt+kih/myhRgaMwsFtt:zkMeRG2Ih/7hfAknaga
Malware Config
Signatures
-
Detected Nirsoft tools 1 IoCs
Free utilities often used by attackers which can steal passwords, product keys, etc.
resource yara_rule sample Nirsoft -
NirSoft WebBrowserPassView 1 IoCs
Password recovery tool for various web browsers
resource yara_rule sample WebBrowserPassView -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ace7779f53e4b3fe7e5addfaaf8cfa34_JaffaCakes118
Files
-
ace7779f53e4b3fe7e5addfaaf8cfa34_JaffaCakes118.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
mscoree
_CorExeMain
Sections
.text Size: 430KB - Virtual size: 430KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.sdata Size: 512B - Virtual size: 139B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ